Academia.eduAcademia.edu

Service Level Agreement

description2,977 papers
group126 followers
lightbulbAbout this topic
A Service Level Agreement (SLA) is a formal contract between a service provider and a client that outlines the expected level of service, including performance metrics, responsibilities, and penalties for non-compliance, ensuring mutual understanding and accountability in service delivery.
lightbulbAbout this topic
A Service Level Agreement (SLA) is a formal contract between a service provider and a client that outlines the expected level of service, including performance metrics, responsibilities, and penalties for non-compliance, ensuring mutual understanding and accountability in service delivery.

Key research themes

1. How can the probability and risk of Service Level Agreement (SLA) violations, especially regarding service availability, be modeled and quantified?

Quantifying the risk and probability of SLA violations related to service availability is crucial for providers to assess financial and operational risks. Research focuses on mathematical modeling of service states (availability/unavailability), statistical distributions of restoration times, and impacts of evaluation intervals on SLA breach probabilities and compensation liabilities.

Key finding: This paper develops a two-state availability model where service alternates between ON (available) and OFF (unavailable) states, assuming exponential distribution for ON durations and exploring exponential, Weibull, and... Read more
Key finding: Proposes a quantitative metric for measuring SLA fulfillment degree rather than a binary fulfilled/violated status. By analyzing SLA structural elements and monitoring data, the approach allows identifying critical service... Read more
Key finding: Defines foundational concepts and technical requirements for SLA and SLA management, emphasizing the importance of precise, measurable SLA parameters such as network availability, throughput, and latency to enable automated... Read more

2. How can multi-objective optimization methods improve SLA compliance and resource management in cloud and fog computing environments?

Cloud and fog computing face challenges in resource allocation balancing cost, energy consumption, and SLA compliance. Multi-objective optimization techniques, especially heuristic and meta-heuristic approaches, are investigated to optimize VM placement, server consolidation, and resource provisioning, simultaneously addressing conflicting objectives such as minimizing SLA violations, energy use, migration overhead, and operational costs.

Key finding: Introduces a multi-objective combinatorial optimization approach employing Non-dominated Sorting Genetic Algorithm II (NSGA-II) to generate Pareto-optimal SLAs balancing cost and makespan in cloud resource allocation. This... Read more
Key finding: Develops an enhanced bio-inspired locust swarm algorithm addressing VM consolidation and mapping in cloud data centers to reduce SLA violations, energy consumption, and VM migrations. Experimentation with real workload traces... Read more
Key finding: Proposes an AI-driven resource management policy using reinforcement learning to continuously consolidate and dynamically allocate VMs in cloud data centers, aiming to reduce energy consumption while maintaining SLA... Read more
Key finding: Presents an SLA specification framework optimized for fog storage services in IoT applications, focusing on a multi-objective trade-off among data availability, throughput, and cost. By specifying SLAs that incorporate these... Read more

3. What methods and protocols can enable dynamic SLA management including renegotiation and secure, automated SLA enforcement in distributed computing environments?

Static SLAs can limit flexibility and adaptability in dynamic cloud and grid computing environments. Research focuses on extending existing SLA specifications to enable runtime SLA renegotiation, dynamic adaptability, and automated secure enforcement. Blockchain-based consensus mechanisms and extended protocol specifications are explored to support trustworthy, decentralized SLA lifecycle management, including monitoring, violation detection, penalty enforcement, and renegotiation.

Key finding: Extends the WS-Agreement XML-based SLA specification to support dynamic SLA renegotiation at runtime. The paper introduces changes to the agreement structure, lifecycle operations, and states enabling SLA terms' adaptability.... Read more
Key finding: Proposes Proof-of-Monitoring (PoM), a blockchain consensus mechanism tailored for secure SLA (SSLA) management in multi-stakeholder 5G networks. PoM integrates SLA monitoring as a consensus task, reducing energy consumption... Read more
Key finding: Analyzes heterogeneity and semantic mismatches in existing service contract specifications, proposing guidelines to reconcile diverse contractual concerns spanning QoS, business, legal, and intellectual property domains. The... Read more

All papers in Service Level Agreement

Continuous monitoring of a network domain poses several challenges. First, routers of a network domain need to be polled periodically to collect statistics about delay, loss, and bandwidth. Second, this huge amount of data has to be mined... more
Multiple access control is an important issue in Ethernet Passive Optical Networks (EPON). It is needed for traffic from different ONUs to share the upstream channel. The IEEE 802.3ah Ethernet in the First Mile (EFM) Task Force has... more
Web Services are entailing a major shift of perspective in software engineering: software is used and not owned, and operation happens on machines that are out of the user control. This means that the user cannot decide the strategy to... more
Web Services are entailing a major shift of perspective in software engineering: software is used and not owned, and operation happens on machines that are out of the user control. This means that the user cannot decide the strategy to... more
Efficient scheduling algorithms are necessary in the cloud paradigm to optimize service provision to clients while minimizing time duration, energy consumption, and violations of service level agreements (SLAs). Disregarding task... more
Business/IT alignment has become one of the most relevant concerns on organizations. Enterprise Architecture (EA) and the Information Technology Infrastructure Library (ITIL) are two distinct governance approaches with different... more
HAL is a multi-disciplinary open access archive for the deposit and dissemination of scientific research documents, whether they are published or not. The documents may come from teaching and research institutions in France or abroad, or... more
Efficient load balancing and performance optimization are critical for managed hosting environments that serve high volumes of traffic. Traditional static load balancing methods may lead to server overload, latency, or downtime.... more
Distributed and grid computing has become the choice of computing in high performance applications. Various projects have developed software infrastructure to harness the enormous power of distributed resources. Applying market approaches... more
The increasing complexity and energy demands of modern cloud data centers have necessitated intelligent resource management strategies that balance efficiency with Quality of Service (QoS). Central to maintaining this balance are Service... more
The increasing complexity and energy demands of modern cloud data centers have necessitated intelligent resource management strategies that balance efficiency with Quality of Service (QoS). Central to maintaining this balance are Service... more
Virtual Machine (VM) instance price prediction in cloud computing is an emerging and important research area. VM instance's price prediction is used for different purposes such as reducing energy consumption, maintaining Service Level... more
Over the past few years, the Virtual Organization (VO) paradigm has been emerging as an ideal solution to support collaboration among globally distributed entities (individuals and/or organizations). However, due to rapid technological... more
The appearance of infinite computing resources that available on demand and fast enough to adapt with load surges makes Cloud computing favourable service infrastructure in IT market. Core feature in Cloud service infrastructures is... more
Various hardware and software resources which are available across the internet are termed as cloud. Cloud computing attracts many consumers with the pay as you use concept. In cloud computing, it is always a challenge to provide... more
Existing services require assurable endto-end quality of service, security and reliability constraints. Therefore, the networks involved in the transport of the data must cooperate to satisfy those constraints. In a next generation... more
Virtual Machine (VM) consolidation is an optimization approach for VM placement in cloud infrastructure, which is one of the effective ways to efficiently utilize cloud resources in order to optimize number of VM migrations, Service Level... more
The paper analyses the current situation in outsourcing of IT and network management through the literature review and examples in industry. We have focused on trends, benefits and risks in outsourcing network management and made... more
The Internet still lacks adequate support for QoS applications with real-time re- quirements. In great part, this is due to the fact that provisioning of end-to-end QoS to traffic that traverses multiple autonomous systems (ASs) requires... more
Adequately supporting applications with Quality-of-service (QoS) requirements is a challenging task, particularly in the Internet. In great part, this is due to the fact that the provisioning of end-toend QoS to traffic that traverses... more
Cloud computing has become integral to modern technology, offering scalable and on-demand access to computational resources. However, cloud data centres face persistent challenges such as high Service Level Agreement (SLA) violations,... more
Targets on availability are generally included in any Service Level Agreement (SLA). When those targets are not met, the service provider has to compensate the customer. The obligation to compensate may represent a significant risk for... more
Grid * Is it possible to identify a taxonomy of SLA terms so terms found in SLAs from dierent hosting environments can be classied? • Term languages * WS-Agrement is agnostic of the application environment * Currently, JSDL is used as... more
As the complexity of large-scale enterprise applications increases, providing performance verification through staging becomes an important part of reducing business risks associated with violating sophisticated service-level agreement... more
The evolvement of prosumers (energy producing consumers) in Smart Grid (SG) ensures reliable and efficient bi-directional power-flow. However, the prosumers interactions and interfacing within the SG system requires a bi-directional... more
The cloud archetype is fundamentally dynamic for both service customer and service provider. From the provider's perspective, resources are removed and/or added irregularly and urgently together with updating of service level... more
Resource provIsioning in Cloud computing is an important problem as the resources are scarce. Better utilization of the existing unutilized resources may solve the future resource scarcity problem. To decide, how much percentage of... more
Resource provIsioning in Cloud computing is an important problem as the resources are scarce. Better utilization of the existing unutilized resources may solve the future resource scarcity problem. To decide, how much percentage of... more
Today's economy creates the need for dynamic, adaptive and autonomous building of enterprise value chains consisting of arbitrary virtualized computing resources, as hardware and software services. The current key technology for service... more
Today, cloud services, such as virtual machines, are traded directly at fixed prices between consumers and providers on platforms, e.g. Amazon EC2. The recent development of Amazon's EC2 spot market shows that dynamic cloud markets are... more
The rapid demand for cloud services has provoked cloud providers to efficiently resolve the problem of Virtual Machines Placement in the cloud. This paper presents a VM Placement using Reinforcement Learning that aims to provide optimal... more
This paper describes a structured approach to encoding monitors in an actor language. Within a configuration of actors, each of which publishes a history, a monitor is an independent actor that triggers an action based on patterns... more
A software-as-a-service (SaaS) needs to provide its intended service as per its stated service-level agreements (SLAs). While SLA violations in a SaaS platform have been reported, not much work has been done to empirically characterize... more
The evolvement of prosumers (energy producing consumers) in Smart Grid (SG) ensures reliable and efficient bi-directional power-flow. However, the prosumers interactions and interfacing within the SG system requires a bi-directional... more
The popularity of cloud computing has been growing where the cloud became an attractive alternative rather than classic information processing system. The distributed denial of service (DDoS) attack is one of the famous attacks to cloud... more
Service Level Agreements are essential tools enabling clients and telco operators to specify required quality of service. The 5GTANGO NFV platform enables SLAs through policies and custom service lifecycle management components. This... more
Unlike previous generations, 5G will need to be faster, more efficient, reliable, flexible, agile, and, at the same time, cost less. For this to be possible, 5G has to engage with the best-of-breed of the emerging technologies, where NFV... more
This document outlines a framework for monitoring and managing services with a service level agreements (SLA) and proposes a complete list of terms suitable for inclusion in the SLA for a preservation service provider. Modelling... more
A major problem that industry is being faced with is related to the miscellaneous of management requirements and to the explosion of management information. Network and systems management often make use of different tools and... more
In a rising era of information and communication technology, data plays a crucial role in all types of crossorganizational research and business applications. Data grids rely on the coordinated sharing of and interaction across multiple... more
Several base elements for the provision of quality of service guarantees have been developed in the recent past. Of these, the Differentiated Services (DiffServ) architecture stands out as the most promising. In spite of this, various... more
The number of devices linked to the Internet is continuously rising along with the development of the Internet of Things (IoT). The IoT and the expanding volume of data it communicates place constraints on cloud-based data processing and... more
This study investigates the efficacy of CCTV as a crime control and management apparatus in commercial premises. Shopping malls and storage facilities with closedcircuit television systems as part of security arrangements were identified... more
ISPs selling IP data transmission with negotiated QoS need to prove to their customers the compliance of actual transmission quality with the negotiated QoS from their contracts. For this it is necessary to monitor the quality of... more
This chapter provides an overview of SRML -the Sensoria Reference Modelling Language. SRML offers a technology-agnostic framework in which business services and activities can be modelled independently of the languages in which components... more
Cloud Computing services are regulated by a contract called Service Level Agreement (SLA). They are cosigned between the customers and the providers after a negotiation phase, and during their validity time several constraints have to be... more
Heterogeneous cloud-edge computing environments present unique challenges in resource allocation due to their distributed nature, varying computational capabilities, and dynamic workload patterns. This paper presents a comprehensive... more
Download research papers for free!